You are here

Cybersecurity

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins - August 4, 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

Alerts, Updates, and Bulletins:

Security Awareness – Trustworthy Brands Make for Convincing Scams

When it comes to phishing and other scams, as a society, we’ve largely grasped the age-old “don’t click on things you don’t recognize” advice. However, threat actors turned that age-old advice against us years ago when they began leveraging well-known brands to trick us into clicking on their malicious links and attachments. The success of social engineering based cyber attacks relies on trust and it’s the trust those brands have already engendered that give scams the air of credibility.

VMWare Releases Security Advisory Addressing Multiple Security Vulnerabilities, Urges Organizations to Patch Immediately

Today, VMWare released a security advisory warning system administrators to patch a critical authentication bypass security vulnerability that affects local domain users in multiple products and allows unauthenticated attackers to gain admin privileges.

Security Awareness – Microsoft Top Brand Impersonated in Phishing Attacks During First Half of 2022

Brand impersonation attacks, when adversaries attempt to mimic a website or domain of a well-known brand by using a similar domain name and webpage designed like the actual site, remain one of the most deceptive forms of phishing. A recent report from the email security company Vade identifies the top brands threat actors impersonated in brand phishing attacks in the first half of 2022.

Threat Awareness – Unpatched Microsoft Exchange Servers Infected with IIS Backdoors

Multiple security researchers have discovered that threat actors are increasingly employing malicious Internet Information Services (IIS) web server extensions to backdoor unpatched Exchange servers. These malicious IIS extensions provide adversaries with a durable persistence tool and are harder to detect than web shells with traditional security tools “since they mainly reside in the same directories as legitimate modules used by target applications,” according to Microsoft.

Security Awareness – Top Smartphone Security Threats

Typically, people think of cyber attacks occurring on their personal or work computers. However, mobile smartphones, which many people use for banking, business communications, and other sensitive activities, are also prime targets for cyber threat actors. Consequently, some of the top threats to Android and Apple smartphones include, but are not limited to, phishing and more specifically smishing (SMS text phishing), SIM hijacking, spyware, financial malware, open Wi-Fi, and ransomware.

Pages

Subscribe to Cybersecurity